QUESTION 232A network administrator is having problems with redistribution routing loops between two EIGRP processes. You’ve looked at the configurations and determined there is no filtering configured on the routes being redistributed. To avoid having a single point of failure, there are three routers configured to redistribute between the two routing protocols. Which solution would you recommend to minimize management complexity?

A. reduce the number of routers redistributing between the two routing processesB. build and apply a route filter based on the networks being redistributed between the two processesC. replace one of the EIGRP processes with an alternate IGPD. use tags to control redistribution between the two processes

Answer: D

QUESTION 233Enterprises A and B agree to merge, but keep IGP and BGP independent of each other. They are served by a common ISP for their Internet connectivity. During the merge, A and B will provision a point-to-point link between the two networks. What is the simplest design option that will allow data to travel between A and B without passing through the ISP?

A. configure OSPF and make OSPF routes more attractive than the same routes learned via EBGP from the ISPB. configure OSPF and make OSPF routes less attractive than the same routes learned via EBGP from the ISPC. configure EBGP between the two networks and block each other’s routes from the ISPD. configure iBGP between the two networks and block each others route’s from the ISPE. configure OSPF between the two networks and block each others route’s from the ISP

Answer: C

QUESTION 234When using LDAP servers, you should configure the password policy to prevent _____.

QUESTION 235A client has approached you about deploying very fast IS-IS hello timers across an intercontinental high speed SONET link.What should you recommend?

A. Fast hello timers are a good choice for this link because on long haul SONET links the reporting of LINE and PATH errors can take a long time.B. Fast hello timers are not a good choice for this link because the link is physically long and the propagation delay may cause IS-IS to believe the link has failed when it has not.C. Fast hello timers are a good choice for this link because the length of the link indicates there will be at least one SONET amplifier that disables PATH alarms on the circuit.D. Fast hello timers are not a good choice for this link because SONET links provide link-down notification much faster than IS-IS could detect a circuit failure by means of hello processing.

Answer: D

QUESTION 236How does an OSPF ABR prevent summary route information from being readvertised from an area into the network core (Area 0)?

A. It uses poison reverse and split horizon.B. It compares the area number on the summary LSA to the local area.C. It only sends locally originated summaries to the backbone.D. It advertises only inter-area summaries to the backbone.

Answer: C

QUESTION 237An IS-IS router is connected to four links and redistributing 75 routes from RIP.How many LSPs will this router originate?

A. one LSP: containing the router information, internal routes, and external routesB. two LSPs: one containing router information and internal routes and one containing external routesC. three LSPs: one containing all links, one containing router information, and one containing external routing informationD. six LSPs: one for each link, one containing router information, and one containing external routing information

Answer: A

QUESTION 238The IGP next-hop reachability for a BGP route is lost but a default route is available. Assuming that BGP connectivity is maintained, what will happen to the BGP route?

A. It will be removed from the BGP table.B. It will be considered invalid for traffic forwarding.C. It will be considered a valid route.D. It will be put in a hold-down state by BGP until the next hop has been updated.

Answer: C

QUESTION 239Which two actions can the sinkhole technique be used to perform? (Choose two.)

A. delay an attack from reaching its targetB. redirect an attack away from its targetC. monitor attack noise, scans, and other activityD. reverse the direction of an attack

Answer: BC

QUESTION 240What are the two best reasons to build a flooding domain boundary in a link-state network? (Choose two.)

A. to prevent the transmission of router-specific information between portions of the networkB. to aggregate reachability informationC. to increase the size of the Shortest Path First treeD. to segregate complex and rapidly changing portions of the network from one anotherE. to provide an administrative boundary between portions of the network

Answer: BD

QUESTION 241You work for a financial institution that is planning to deploy a new multicast application in your network to do real-time trading. This application will be run simultaneously by thousands of traders located throughout your network, each a source of several IP multicast streams, to carry the “sell” and “buy” trading bids. All routers in your network have full hardware support for all PIM multicast modes.Which mode should you use in order to minimize the impact of the new application on the routers in your network?